|Category:||CentOS Local Security Checks|
|Title:||CentOS Update for thunderbird CESA-2012:0085 centos5|
|Summary:||The remote host is missing an update for the 'thunderbird'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'thunderbird'
package(s) announced via the referenced advisory.
Mozilla Thunderbird is a standalone mail and newsgroup client.
A flaw was found in the processing of malformed content. An HTML mail
message containing malicious content could cause Thunderbird to crash or,
potentially, execute arbitrary code with the privileges of the user running
The same-origin policy in Thunderbird treated http://example.com and http://[example.com]
as interchangeable. A malicious script could possibly
use this flaw to gain access to sensitive information (such as a client's
IP and user e-mail address, or httpOnly cookies) that may be included in
HTTP proxy error replies, generated in response to invalid URLs using
square brackets. (CVE-2011-3670)
Note: The CVE-2011-3670 issue cannot be exploited by a specially-crafted
It could be exploited another way in Thunderbird, for example, when viewing
the full remote content of an RSS feed.
All Thunderbird users should upgrade to this updated package, which
resolves these issues. All running instances of Thunderbird must be
restarted for the update to take effect.
thunderbird on CentOS 5
Please install the updated packages.
Common Vulnerability Exposure (CVE) ID: CVE-2011-3670|
Debian Security Information: DSA-2400 (Google Search)
Debian Security Information: DSA-2402 (Google Search)
Debian Security Information: DSA-2406 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0198 (Google Search)
SuSE Security Announcement: SUSE-SU-2012:0221 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:0234 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2012-0442
|Copyright||Copyright (C) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.